Jump to content

Andrew Osborn

Employee
  • Posts

    26
  • Joined

  • Last visited

  • Days Won

    2

7 Followers

About Andrew Osborn

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Andrew Osborn's Achievements

  1. https://techzone.omnissa.com/resource/delivering-anywhere-workspace-dod365-integration In today’s remote worker environment, the Department of Defense (DoD) is migrating away from the COVID-19 emergency response deployment, under the Commercial Virtual Remote (CVR) program. The solution was invoked at the time to ensure a rapid enablement of the remote worker within the DoD branches/services access to Microsoft’s commercial O365. Now, a transition to a higher security, long-term office productivity environment that end-users will leverage both in the office and at home has begun. This transition involves connecting to a DoD-enhanced version ‘DoD365’, as well as other derivatives that are custom to military branches (e.g., Army365). The article will cover how 'Anywhere Workspace' can be achieved through Workspace ONE End-User Computing (EUC) suite, providing the necessary enablement of DoD365 integration and enhancements for enterprise-grade UEM, cloud-enablement, and cybersecurity elements for Zero-Trust Security,
  2. At Omnissa, it's our mission to enable smart, seamless, and secure work experiences from anywhere. We continue to innovate with the vision of creating self-healing, self-securing environments. Click below to learn in the blog more about how the Omnissa Platform and our Security & Compliance solution can help your business. Proactive security: The Omnissa Security & Compliance Solution
  3. Omnissa and CrowdStrike have announced a collaboration to bring the Omnissa AI-driven digital work platform together with CrowdStrike’s AI-driven Falcon cybersecurity platform to increase cyber resilience for customers. The collaboration, announced October 23, 2024, at Omnissa ONE Amsterdam, aims to provide an end-to-end solution for threat visibility and interconnected vulnerability detection and remediation. Click below for how Omnissa and CrowdStrike intend to integrate best-of-breed digital work and security platforms to solve for the critical challenge of continuously connecting the digital workspace — both UEM and virtual desktops and apps — with endpoint protection and extended detection and response solutions. Omnissa & CrowdStrike partner to secure virtual and physical desktop
  4. Workspace ONE Mobile Threat Defense demo for admins! Need protection against phishing, device vulnerabilities, risky apps, rogue Wi-Fi networks, web threats and more? Take this tour to find out how as an admin you can enable Workspace ONE MTD to help neutralize these threats.
  5. Workspace ONE Mobile Threat Defense for Employees – Risky Apps & Networks demo! With Workspace ONE Intelligent Hub on a mobile device, an admin can enable Mobile Threat Defense to provide secure access to corporate resources by enforcing policies on end-users to take action to remove the threats found! Click above to take the tour to find out how this protection works both on the device and as an admin!
  6. Workspace ONE MTD – Phishing & Content Protection demo! In this video demo on TechZone, you'll be walked through how Workspace ONE Intelligent Hub on a mobile device can protect end-users from PCP related cybersecurity risks, as well as show how as an admin turns on these Mobile Threat Defense features; take this tour to find out how Phishing & Content Protection works!
  7. Chaining Horizon Server API Calls to automate Horizon tasks! No REST for The RESTful: Chaining Together Calls To The Horizon Server API Linked to Omnissa's resident @Justin Johnson's Blog site evengooder > his blog post reviews how to chain together Horizon Server API calls to automate Horizon tasks. Using Postman collections can be configured for sequences of calls that build upon each other, passing variables from request to request. More specifically, there's JavaScript wrapped around each request through (further linked details: pre-request and post-requests scripts) that share variables across the collection.
  8. Mobile Threat Report for U.S. Public Sector In the above whitepaper you'll find key takeaways from last year back thru the pandemic, as we moved zero trust from a conceptual framework to something that both public and private sectors needed ‘yesterday’! The WP details the migration from old perimeter-based ‘castle-and-moat’ security model that was finally starting to show its age, and covering the transition factors contributing factors and paradigm shift, some fundamental or institutional in nature, but also largely by such previous high-profile cases like the Colonial Pipeline REvil ransomware gang and SolarWinds breach attacks on US agencies—including parts of the Pentagon, the Department of Homeland Security, the State Department, the Department of Energy, the National Nuclear Security Admin, and the Treasury but also numerous Defense Industrial Base (DIB) and State, Local & Education (SLED) entities—that were the driving force in doing so. Today, those attacks and their predecessors are simply the tip of the iceberg regarding malware and malicious actors’ Tactics, Techniques & Procedures (TTPs) and the diverse array of systems they are going after, which includes less thought of areas; things like Cloud, IoT, and ICS but also a steady dose of mobile-enabled efforts. As highlighted in the headlines in Figure 1, these bulletins and notices from companies, related to vulnerabilities and their associated threats to establish the Cyber Kill Chain (CKC), only continue to accelerate into 2023. These mobile-enabled Advanced Persistent Threats (APTs) require advanced techniques to defend, deny, disrupt, and contain data exfiltration from the end-user’s device, the network, or the cloud.
  9. How Workspace ONE can mitigate Cyber Insurance Premium Requirements In this post, find out how Omnissa Workspace ONE and Horizon can mitigate Cyber insurance premium requirements, as the blog aims to help customers understand & implement modern security solutions to meet Cyber Insurance validation audits & self-attestation, in order to help customers to understand & Implement Modern Security Solutions to meet Cyber Insurance Validation Audits & Self-Attestation.
  10. CMMC Compliance: How to Secure End-Users and Endpoint with EUC In this post, Omnissa will briefly review Cybersecurity Maturity Model Certification (CMMC) components and how Omnissa Workspace ONE's End-User Computing (EUC) solutions can logically align to the National Institute of Standards & Technology (NIST) Special Publication (SP) 800-171 protecting Controlled Unclassified Information framework to provide a Defense Industrial Base (DIB) contractor/integrator/service provider (SP) (or A.K.A. GovCons) a roadmap to meet certification requirements.
  11. would love to collaborate on that ... yes it's on TZ ... i'm adding links to these as well
  12. Workspace ONE Cloud Services Alignment with NIST SP 800-171 The National Institute of Standards and Technology (NIST) Special Publication 800-171 was developed to provide guidance to organizations, such as U.S. government contractors, on how to protect Controlled Unclassified Information (CUI) in non-federal systems. CUI is information that the government considers sensitive but not classified. There are over 100 security requirements of NIST SP 800-171 organized into 14 requirement families, which Omnissa's platform alignment is summarized in this Whitepaper for the Workspace ONE Cloud Services.
  13. Horizon Cloud Service next-gen Alignment with the Australian ACSC ISM This document addresses the security for Omnissa Horizon Cloud Next-Gen in relation to the Australian Cyber Security Centre (ACSC) Information Security Manual (ISM). The purpose of the ISM is to outline a cyber security framework that organizations can apply, using their risk management framework, to protect their information and systems from cyber threats. Thus, this whitepaper summarizes the Omnissa information security program alignment with the Cyber Security Principles and Cyber Security Guidelines within the ISM.
  14. Workspace ONE & Germany's Cloud Computing Compliance Criteria Catalogue (C5) The Cloud Computing Compliance Controls Catalogue (C5) is a cloud security certification prescribed by the German Federal Office of Information Security (BSI). The certification describes the security controls and processes implemented by cloud service providers to secure customer workloads and the infrastructure supporting the cloud platform. While Omnissa Workspace ONE® cloud services are yet to undergo the certification for C5, this whitepaper intends to show the controls and processes Workspace ONE cloud services have in place to address the control requirements in C5 certification. To complement this whitepaper, customers can also utilize the mapping document published by BSI, which shows how C5 standards map to various international compliance certifications. The mapping document is available in Referencing Cloud Computing Compliance Criteria Catalogue (C5) to International Standards. For the latest updates on Workspace ONE compliance certifications, see the Omnissa Trust Center.
×
×
  • Create New...